Secure Virtualization Implementation Services

Overview

According to a recent InformationWeek survey, only one in eight enterprises have a formal security or information protection strategy for their virtual infrastructure. What is your security strategy for virtual infrastructure?

Whether you are contemplating, implementing, or currently managing a virtual infrastructure, you are probably quite comfortable with the economic and architectural flexibility benefits from virtualization. However, are you confident in your approach to vulnerability, security, and risk management? Was security part of the requirement when building your virtual infrastructure? Do you have proper policies and procedures to deal with rogue virtual servers, patch management, operating system separation, and change control? Are you aware of technology best practices to secure your virtual infrastructure?

Key Benefits

Identify and mitigate virtual infrastructure risksFoundstone reviews the people, process, and technology surrounding the targeted virtual infrastructure. Uncover vulnerabilities and gaps with industry accepted best practices to the architecture, configuration, and ongoing management of corporate assets. As part of our Secure Virtualization Implementation Services, Foundstone performs an agile assessment to analyze the key areas that influence the security of your virtual infrastructure. Obtaining this understanding of how virtualization affects your organization’s security posture can help you compare the findings with your desired security assurance level.

Address compliance-related challengesFoundstone’s experienced security consultants worked with virtualization vendors to secure their products, and are highly qualified to help you create a security report card for your virtual infrastructure.

Methodology

Foundstone assesses your virtual infrastructure in the following three major phases:

Architecture and design reviewFoundstone provides insight into your current virtual infrastructure architecture and design, specifically as it relates to security.